{"id":"https://openalex.org/W2610065900","doi":"https://doi.org/10.1109/access.2017.2698390","title":"Security Analysis of Two Password-Authenticated Multi-Key Exchange Protocols","display_name":"Security Analysis of Two Password-Authenticated Multi-Key Exchange Protocols","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2610065900","doi":"https://doi.org/10.1109/access.2017.2698390","mag":"2610065900"},"language":"en","primary_location":{"id":"doi:10.1109/access.2017.2698390","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2017.2698390","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2017.2698390","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088264677","display_name":"Min Luo","orcid":"https://orcid.org/0000-0002-1819-9332"},"institutions":[{"id":"https://openalex.org/I143868143","display_name":"Anhui University","ror":"https://ror.org/05th6yx34","country_code":"CN","type":"education","lineage":["https://openalex.org/I143868143"]},{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Min Luo","raw_affiliation_strings":["Co-Innovation Center for Information Supply & Assurance Technology, Anhui University, Hefei, China","State Key Lab of Software Engineering, Computer School, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Co-Innovation Center for Information Supply & Assurance Technology, Anhui University, Hefei, China","institution_ids":["https://openalex.org/I143868143"]},{"raw_affiliation_string":"State Key Lab of Software Engineering, Computer School, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101971686","display_name":"Xiaotong Zhou","orcid":"https://orcid.org/0000-0002-4856-0627"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaotong Zhou","raw_affiliation_strings":["State Key Lab of Software Engineering, Computer School, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"State Key Lab of Software Engineering, Computer School, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100361380","display_name":"Li Li","orcid":null},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li Li","raw_affiliation_strings":["International School of Software, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"International School of Software, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001746807","display_name":"Kim\u2010Kwang Raymond Choo","orcid":"https://orcid.org/0000-0001-9208-5336"},"institutions":[{"id":"https://openalex.org/I170239107","display_name":"University of South Australia","ror":"https://ror.org/01p93h210","country_code":"AU","type":"education","lineage":["https://openalex.org/I170239107"]},{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["AU","US"],"is_corresponding":false,"raw_author_name":"Kim-Kwang Raymond Choo","raw_affiliation_strings":["Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA","School of Information Technology and Mathematical Sciences, University of South Australia, Adelaide, SA, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]},{"raw_affiliation_string":"School of Information Technology and Mathematical Sciences, University of South Australia, Adelaide, SA, Australia","institution_ids":["https://openalex.org/I170239107"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["State Key Lab of Software Engineering, Computer School, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"State Key Lab of Software Engineering, Computer School, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5088264677"],"corresponding_institution_ids":["https://openalex.org/I143868143","https://openalex.org/I37461747"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.8252,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.75609756,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"5","issue":null,"first_page":"8017","last_page":"8024"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10986","display_name":"RFID technology advancements","score":0.9804999828338623,"subfield":{"id":"https://openalex.org/subfields/2214","display_name":"Media Technology"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8250366449356079},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.7798765301704407},{"id":"https://openalex.org/keywords/authenticated-key-exchange","display_name":"Authenticated Key Exchange","score":0.7440861463546753},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6930890679359436},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.676074206829071},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5491616129875183},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5238338112831116},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.5045562982559204},{"id":"https://openalex.org/keywords/security-association","display_name":"Security association","score":0.42914247512817383},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.30567121505737305},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.17207887768745422},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.12363728880882263},{"id":"https://openalex.org/keywords/network-access-control","display_name":"Network Access Control","score":0.09705492854118347},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.08777862787246704}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8250366449356079},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.7798765301704407},{"id":"https://openalex.org/C2777572472","wikidata":"https://www.wikidata.org/wiki/Q4825878","display_name":"Authenticated Key Exchange","level":5,"score":0.7440861463546753},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6930890679359436},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.676074206829071},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5491616129875183},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5238338112831116},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.5045562982559204},{"id":"https://openalex.org/C130881749","wikidata":"https://www.wikidata.org/wiki/Q586894","display_name":"Security association","level":5,"score":0.42914247512817383},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.30567121505737305},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.17207887768745422},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.12363728880882263},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.09705492854118347},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.08777862787246704},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2017.2698390","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2017.2698390","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:14346aff78f945c698783bd0efc2728b","is_oa":true,"landing_page_url":"https://doaj.org/article/14346aff78f945c698783bd0efc2728b","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 5, Pp 8017-8024 (2017)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2017.2698390","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2017.2698390","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5699999928474426,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G2741281456","display_name":null,"funder_award_id":"2015CFB257","funder_id":"https://openalex.org/F4320322186","funder_display_name":"Natural Science Foundation of Hubei Province"},{"id":"https://openalex.org/G4925959090","display_name":null,"funder_award_id":"61501333","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8895439857","display_name":null,"funder_award_id":"U1536204","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8938912181","display_name":null,"funder_award_id":"61572379","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8983096328","display_name":null,"funder_award_id":"61402339","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322186","display_name":"Natural Science Foundation of Hubei Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W915730097","https://openalex.org/W1526070463","https://openalex.org/W1988640034","https://openalex.org/W2068513923","https://openalex.org/W2070395833","https://openalex.org/W2081636541","https://openalex.org/W2095099050","https://openalex.org/W2106150202","https://openalex.org/W2156186849","https://openalex.org/W2525678842","https://openalex.org/W6631658552"],"related_works":["https://openalex.org/W3000282663","https://openalex.org/W2387820617","https://openalex.org/W2371102389","https://openalex.org/W2041428801","https://openalex.org/W1772901473","https://openalex.org/W1921661296","https://openalex.org/W2613628930","https://openalex.org/W2994818600","https://openalex.org/W2949365815","https://openalex.org/W2098450588"],"abstract_inverted_index":{"Mobile":[0],"communications":[1,22],"(e.g.,":[2],"emails,":[3],"Snapchat":[4],"and":[5,47],"Facebook)":[6],"over":[7,53],"a":[8,12,45],"wireless":[9,56,69],"connection":[10],"is":[11,25],"norm":[13],"in":[14],"our":[15],"Internet-connected":[16],"society.":[17],"Ensuring":[18],"the":[19,42,48],"security":[20],"of":[21,31,44,50],"between":[23],"devices":[24],"an":[26,54],"ongoing":[27],"challenge.":[28],"A":[29],"number":[30],"authenticated":[32],"key":[33],"exchange":[34],"(AKE)":[35],"protocols":[36,66,79],"have":[37],"been":[38],"proposed":[39,63],"to":[40,82,92],"verify":[41],"authenticity":[43],"user":[46],"integrity":[49],"messages":[51],"sent":[52],"insecure":[55],"communication":[57],"channel.":[58],"Recently,":[59],"Tsai":[60],"et":[61],"al.":[62],"two":[64],"AKE":[65],"designed":[67],"for":[68],"network":[70],"systems.":[71],"In":[72],"this":[73],"paper,":[74],"we":[75],"demonstrate":[76],"that":[77],"their":[78,93],"are":[80],"vulnerable":[81],"off-line":[83],"password":[84],"guessing":[85],"attacks":[86],"through":[87],"presenting":[88],"concrete":[89],"attacks,":[90],"contrary":[91],"claims.":[94]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
